Fortinet white logo
Fortinet white logo

Administration Guide

Network device

Network device

Note: As of 9.4.4, this view was moved under Network > Settings.

Network Device allows you to set global properties that are specific to network devices and VLANs.

  1. Click Network > Settings > Network Device.
  2. Click a field and enter a setting. See the table below for settings.
  3. Click Save Settings.
Settings

Field

Definition

Agent Switching Delay (Sec)

Number of seconds FortiNAC waits before a host that has failed the Persistent Agent Check will be switched to the Quarantine or Remediation VLAN.

Default = 0 seconds

Minimum Trap Period (Sec)

Number of seconds FortiNAC waits after receiving a linkup trap before reading the forwarding table from the switch associated with the trap.

Default setting = 10 seconds

Max Number of Trap Periods

Maximum number of Trap Periods that the appliance waits before reading the switch forwarding tables.

If the switch does not have the MAC address information for the port that generated the linkup trap, the appliance places the switch back into the queue. Once the Minimum Trap Period has expired, the forwarding table on the switch is read again.

If another linkup trap is generated by the same switch the trap period time is reset.

Default setting = 4

For example, if the Minimum Trap Period is set to 20 seconds and the Max Number of Trap Periods is set to 2, the longest the appliance will wait to read the switch forwarding tables is 40 seconds.

Cold Start/Warm Start Trap Delay (Sec)

After receiving a Cold/Warm Start trap, FortiNAC waits for the amount of time specified in that field before polling the switches.

Note: When the L2 poll is scheduled at the same time the delay is in progress, the poll gets delayed until the Cold Start/Warm Start Trap Delay interval is finished.

Registration Delay (Sec)

Number of seconds FortiNAC waits before switching a port to the production VLAN.

This allows the user registering a host time to read the information on the Registration Success page.

Default setting = 5 seconds

If another host connects to the same switch during the Registration Delay time, the switch updates and the port is switched to the production VLAN without waiting for the delay time to expire.

System Defined Uplink Count

When the number of MAC addresses on a port exceeds this value the port is changed to an uplink. Setting this value to a higher number can help to indicate Multi-Access points.

Default setting = 20

For example, setting this value to 7 changes the port to an uplink if a minihub with 8 ports is connected on the port.

See Port properties.

Telnet Connection
Timeout (Sec)

When using telnet to contact devices, this setting determines how long the server waits for a response from the device before timing out.

Default = 12 seconds

VLAN Reset Delay (Sec)

Number of seconds FortiNAC waits before resetting the VLAN of a port that has no connected hosts or devices. The port must be a member of either the Reset to Registration group or the Reset to Default port group. If the port is a member of both groups, the Registration VLAN takes precedence.

Default = 60 seconds

VLAN Switching Delay (Sec)

Number of seconds FortiNAC waits between disabling and reenabling a port when switching it to another VLAN.

Default setting = 8 seconds

If this value is left as zero (0) the host may have an invalid IP on the new VLAN.

MAC address Spoof Time Delay (Minutes)

Supported for wired connections only.

The default is set to 5 minutes.

Non-zero value: The number of minutes after which, if the same MAC address has been detected on two devices/ports simultaneously on two different switches, the Possible MAC address Spoof event will be generated.

Workflow:

  1. Two devices connect with the same MAC address: one to switch A and on to switch B
  2. L2 poll of switch A (detects one of the devices)
  3. L2 poll of switch B (detects the other device)
  4. Wait the number of minutes specified by MAC address Spoof Time Delay value
  5. L2 poll of switch A
  6. L2 poll of switch B
  7. If the MAC address is still detected in both locations, Possible MAC address Spoof event is generated

Note:

  • An event will not be generated if both devices with the same MAC address are connected to the same physical switch.

  • A long age time in a host may cause the MAC address of the host to be falsely reported as connected to more than one device at the same time. For example, Host A is connected to Switch A with an age time of 10 minutes. Host A is moved to Switch B and FortiNAC updates the location. FortiNAC reads Switch A which still shows Host A as online because Host A has not yet aged out.

Zero (0) value: (Recommended - available in FortiNAC Versions 8.8.8, 9.1.2 and above) Enables two features:

  • The Possible MAC address Spoof event will be generated on every connection move that occurs on an L2 Poll.

  • The Possible MAC address Spoof event will be generate on a connection move, that occurs on the same physical Switch.

Enable Multi-Access Detection

When enabled, the appliance looks for multiple MAC addresses on ports each time a switch is read.

Default = Disabled

To have an event generated when multiple MAC addresses are detected on a port the Multi-Access Point Detected event must also be enabled. However, if the port is in the Authorized Access Points group an event is not generated.

See Event management to enable the Multi-Access Point Detected event. See System groups to determine if the port is in the Authorized Access Points group.

Multi-Access Detection Threshold

The number of MAC addresses that are allowed on a port before a Multi-Access Point Detected event is generated.

Enable Cisco Discovery
Protocol

When enabled, allows FortiNAC to query devices about other connected devices on the network. If a device has this discovery protocol enabled it gathers and stores information about devices it manages and devices it can contact on the network. Only devices with CDP enabled will respond to a CDP query.

This is a global setting for the system. If this setting is enabled, devices can be set individually on the Polling Tab of the Device Properties View. If this setting is disabled, the device setting is ignored and the CDP feature is not used when polling a device. Devices that have the capacity for CDP must have the feature configured on the device's firmware.

Default = Enabled

Enable Link Layer Discovery Polling

When enabled, allows devices to advertise information and their identity to neighboring devices connected to the same network.

Maximum Cisco Discovery Depth

Limits the number of layers from the original device that will be queried using Cisco Discovery Protocol. For example, if the Depth is set to 1, then FortiNAC will only query for devices that are directly connected to the device with the starting IP address during the Discovery process. If the Depth is set to 2, then FortiNAC stops querying after it reaches the second level of devices away from the starting IP address.

See Discovery.

Ignore MAC Notification Traps for IP Phones

When enabled, FortiNAC will not process MAC Notification Traps for IP Phones. This setting is enabled by default.

Disabling this setting may cause FortiNAC to process large numbers of traps, resulting in decreased performance.

Enable Network Access Policy for Wireless Access Points

When enabled Network Access Policies will be applied to Wireless Access Points connected to the network. Note the port it is connected to must be a member of the Role-Based Access group.

Wireless Access Point Enforcement Group

A port group which will be populated when a Wireless Access Point is connected. The port it connects to will be added to the group. The port will not be automatically removed from the group.

Preserve Port Names

Enabled by default. When disabled, any port names/labels that have been changed on the switch will be updated in the FortiNAC database upon the next "Resync Interfaces". Affects all device models when modified in this view. To modify at the device model level, see Device properties.

Network device

Network device

Note: As of 9.4.4, this view was moved under Network > Settings.

Network Device allows you to set global properties that are specific to network devices and VLANs.

  1. Click Network > Settings > Network Device.
  2. Click a field and enter a setting. See the table below for settings.
  3. Click Save Settings.
Settings

Field

Definition

Agent Switching Delay (Sec)

Number of seconds FortiNAC waits before a host that has failed the Persistent Agent Check will be switched to the Quarantine or Remediation VLAN.

Default = 0 seconds

Minimum Trap Period (Sec)

Number of seconds FortiNAC waits after receiving a linkup trap before reading the forwarding table from the switch associated with the trap.

Default setting = 10 seconds

Max Number of Trap Periods

Maximum number of Trap Periods that the appliance waits before reading the switch forwarding tables.

If the switch does not have the MAC address information for the port that generated the linkup trap, the appliance places the switch back into the queue. Once the Minimum Trap Period has expired, the forwarding table on the switch is read again.

If another linkup trap is generated by the same switch the trap period time is reset.

Default setting = 4

For example, if the Minimum Trap Period is set to 20 seconds and the Max Number of Trap Periods is set to 2, the longest the appliance will wait to read the switch forwarding tables is 40 seconds.

Cold Start/Warm Start Trap Delay (Sec)

After receiving a Cold/Warm Start trap, FortiNAC waits for the amount of time specified in that field before polling the switches.

Note: When the L2 poll is scheduled at the same time the delay is in progress, the poll gets delayed until the Cold Start/Warm Start Trap Delay interval is finished.

Registration Delay (Sec)

Number of seconds FortiNAC waits before switching a port to the production VLAN.

This allows the user registering a host time to read the information on the Registration Success page.

Default setting = 5 seconds

If another host connects to the same switch during the Registration Delay time, the switch updates and the port is switched to the production VLAN without waiting for the delay time to expire.

System Defined Uplink Count

When the number of MAC addresses on a port exceeds this value the port is changed to an uplink. Setting this value to a higher number can help to indicate Multi-Access points.

Default setting = 20

For example, setting this value to 7 changes the port to an uplink if a minihub with 8 ports is connected on the port.

See Port properties.

Telnet Connection
Timeout (Sec)

When using telnet to contact devices, this setting determines how long the server waits for a response from the device before timing out.

Default = 12 seconds

VLAN Reset Delay (Sec)

Number of seconds FortiNAC waits before resetting the VLAN of a port that has no connected hosts or devices. The port must be a member of either the Reset to Registration group or the Reset to Default port group. If the port is a member of both groups, the Registration VLAN takes precedence.

Default = 60 seconds

VLAN Switching Delay (Sec)

Number of seconds FortiNAC waits between disabling and reenabling a port when switching it to another VLAN.

Default setting = 8 seconds

If this value is left as zero (0) the host may have an invalid IP on the new VLAN.

MAC address Spoof Time Delay (Minutes)

Supported for wired connections only.

The default is set to 5 minutes.

Non-zero value: The number of minutes after which, if the same MAC address has been detected on two devices/ports simultaneously on two different switches, the Possible MAC address Spoof event will be generated.

Workflow:

  1. Two devices connect with the same MAC address: one to switch A and on to switch B
  2. L2 poll of switch A (detects one of the devices)
  3. L2 poll of switch B (detects the other device)
  4. Wait the number of minutes specified by MAC address Spoof Time Delay value
  5. L2 poll of switch A
  6. L2 poll of switch B
  7. If the MAC address is still detected in both locations, Possible MAC address Spoof event is generated

Note:

  • An event will not be generated if both devices with the same MAC address are connected to the same physical switch.

  • A long age time in a host may cause the MAC address of the host to be falsely reported as connected to more than one device at the same time. For example, Host A is connected to Switch A with an age time of 10 minutes. Host A is moved to Switch B and FortiNAC updates the location. FortiNAC reads Switch A which still shows Host A as online because Host A has not yet aged out.

Zero (0) value: (Recommended - available in FortiNAC Versions 8.8.8, 9.1.2 and above) Enables two features:

  • The Possible MAC address Spoof event will be generated on every connection move that occurs on an L2 Poll.

  • The Possible MAC address Spoof event will be generate on a connection move, that occurs on the same physical Switch.

Enable Multi-Access Detection

When enabled, the appliance looks for multiple MAC addresses on ports each time a switch is read.

Default = Disabled

To have an event generated when multiple MAC addresses are detected on a port the Multi-Access Point Detected event must also be enabled. However, if the port is in the Authorized Access Points group an event is not generated.

See Event management to enable the Multi-Access Point Detected event. See System groups to determine if the port is in the Authorized Access Points group.

Multi-Access Detection Threshold

The number of MAC addresses that are allowed on a port before a Multi-Access Point Detected event is generated.

Enable Cisco Discovery
Protocol

When enabled, allows FortiNAC to query devices about other connected devices on the network. If a device has this discovery protocol enabled it gathers and stores information about devices it manages and devices it can contact on the network. Only devices with CDP enabled will respond to a CDP query.

This is a global setting for the system. If this setting is enabled, devices can be set individually on the Polling Tab of the Device Properties View. If this setting is disabled, the device setting is ignored and the CDP feature is not used when polling a device. Devices that have the capacity for CDP must have the feature configured on the device's firmware.

Default = Enabled

Enable Link Layer Discovery Polling

When enabled, allows devices to advertise information and their identity to neighboring devices connected to the same network.

Maximum Cisco Discovery Depth

Limits the number of layers from the original device that will be queried using Cisco Discovery Protocol. For example, if the Depth is set to 1, then FortiNAC will only query for devices that are directly connected to the device with the starting IP address during the Discovery process. If the Depth is set to 2, then FortiNAC stops querying after it reaches the second level of devices away from the starting IP address.

See Discovery.

Ignore MAC Notification Traps for IP Phones

When enabled, FortiNAC will not process MAC Notification Traps for IP Phones. This setting is enabled by default.

Disabling this setting may cause FortiNAC to process large numbers of traps, resulting in decreased performance.

Enable Network Access Policy for Wireless Access Points

When enabled Network Access Policies will be applied to Wireless Access Points connected to the network. Note the port it is connected to must be a member of the Role-Based Access group.

Wireless Access Point Enforcement Group

A port group which will be populated when a Wireless Access Point is connected. The port it connects to will be added to the group. The port will not be automatically removed from the group.

Preserve Port Names

Enabled by default. When disabled, any port names/labels that have been changed on the switch will be updated in the FortiNAC database upon the next "Resync Interfaces". Affects all device models when modified in this view. To modify at the device model level, see Device properties.